Thursday, May 29, 2008

Free password protection for your files

Image Hosted by ImageShack.usIf you are looking to protect your files from anyone else who might use your computer, there are different possibilities you can choose from. An easy option is to use the embedded function present in many software applications. Every Office application for example, from Word to Access, includes the possibility to password protect a document by simply writing a password in the Tools > Options > Security menu item.

If the application you are using doesn’t have this feature, you can always put it in a password-protected archive file (.ZIP or .RAR, for example) using your favourite compression program. However, if you use that file frequently it surely is not the most convenient solution. If this is the case you can consider using a specific program.

My Lockbox is a security software enabling you to password protect any folder on your computer.

Free Hide Folder - is a powerful free tool to protect and hide sensitive folders on your computer. The invisible files can only be opened through the application’s file manager.

AxCrypt - is an excellent free encryption utility that enables users to encrypt all files within a folder and not allow those files to be viewed without a passphrase.

If what you are looking for is a secure place to write your secrets, have a look at myDiary, where you can write down your daily thoughts and lock them up, just like one of those old-fashioned secret diaries.

Monday, May 26, 2008

Remove CiD Popups

Step 1
CiD Removal
  • Go to Start > Control Panel > Add/Remove Programs
  • Uninstall any of the following:
    • Bitdownload
    • Bitroll
    • Bitgrabber
    • Browser Enhancer
    • CiD Help
    • CiD Manager
    • Download Plugin for Internet Explorer
    • Messenger Plus! and Sponsor or CiD Help
    • Netpumper
    • Search Plugin
    • Torrent101
    • Ultimate Browser Enhancer
    • W3player
    • Window Search
    • Window Searching
    • WinZix
    • Zone Media
  • Restart your PC when complete.
Note: if you’re asked for a Verification code enter the numbers that appear in the window.

If you do not remember which bundled software product you installed or do not see the above programs that included the sponsor software you can download and run the universal uninstaller > Uninstall.exe

Step 2

Download NoLop.exe to your desktop.

Alternate Download Link

  • First close any other programs you have running as this will require a reboot.
  • Double click NoLop.exe to run it.
  • Then click the button labelled "Search and Destroy".
  • When scanning is finished you will be prompted to reboot only if infected,click 'OK'.
  • Now click the "REBOOT" Button.
  • A Message should popup from NoLop, if not, double click the program again and it will finish.
A log is created in C:\NoLop.log

If you receive an error "mscomctl.ocx or one of its dependencies are not correctly registered," please download mscomctl.ocx to your system32 folder then rerun the program.

Step 3

Download Malwarebytes' Anti-Malware from here or here

Double Click mbam-setup.exe to install the application.
  • Make sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select "Perform Quick Scan", then click Scan.
  • The scan may take some time to finish,so please be patient.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.(See Extra Note)
  • The log is automatically saved by MBAM and can be viewed by clicking the Logs tab in MBAM.
Extra Note: If MBAM encounters a file that is difficult to remove,you will be presented with 1 of 2 prompts,click OK to either and let MBAM proceed with the disinfection process,if asked to restart the computer,please do so immediately.

Step 4

Download and install CCleaner
  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then Next.
  • Read the license agreement and click I Agree.
  • Click Next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the Windows tab, under Internet Explorer, uncheck Cookies if you do not want them deleted. (If deleted, you will likely need to re-enter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for Cookies is on the Applications tab, under Firefox/Mozilla.
  • Click on the Options icon at the left side of the window, then click on Advanced.
    uncheck Only delete files in Windows Temp folders older than 48 hours.
  • Click on the Cleaner icon on the left side of the window, then click Run Cleaner to run the program.
  • Caution: Only use the Registry feature if you are very familiar with the registry.
  • Always back up your registry before making any changes.
  • Exit CCleaner after it has completed it's process.

You should now be rid CiD and the annoying popups. If you are still any computer problems visit Computer Juice and ask for help in the Virus, Spyware & Security. Registration and help is always free!

Note: When installing software it is always best to read the EULA and never install Sponsor Programs unless you know exactly what they are.

More information on this can be found at the parent site:

Saturday, May 24, 2008

Slow Computer? It May Not Be Malware

Image Hosted by

Cleaning, regular maintenance, and updating are essential to a computers continued speedy performance

Remove unnecessary programs

  1. Click Start > Control Panel
  2. Click Add or Remove Programs
  3. Scroll through the list and examine each program.
  4. Click each program you no longer need, click the Change/Remove button, and then follow the prompts to uninstall it.
You may have to restart your computer after removing a program. After your computer restarts, repeat the steps above to remove more programs.

You may find a few Toolbars or a number of programs you have forgotten about or didn't know were there.

If there are problems removing any programs from add/remove programs try the Windows Installer CleanUp Utility

Remove unused files from your system

Run CCleaner on each user account

Download CCleaner

It is suggested to download the CCleaner - Slim - No Toolbar which is the version without the Yahoo! Toolbar.
  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then next.
  • Read the license agreement and click I Agree.
  • Click next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the "Windows" tab, under "Internet Explorer," uncheck "Cookies" if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for "Cookies" is on the Applications tab, under Firefox/Mozilla.
  • Click on the "Options" icon at the left side of the window, then click on "Advanced."
    deselect "Only delete files in Windows Temp folders older than 48 hours."
  • Caution: It is not recommended that you use the "Registry" feature unless you are very familiar with the registry as it has been known to find legitimate items.
  • Click on the "Cleaner" icon on the left side of the window, then click Run Cleaner to run the program.
  • After CCleaner has completed its process, click Exit.
CCleaner Tour: After Installation

A common myth that will not improve performance is cleaning the Prefetch folder. Please see: Don’t clean out the Prefetch folder.

Defragment the Hard Drive

Over the course of regular PC use, your files get fragmented and spread out all over the hard drive.
Reading and writing data on a heavily fragmented hard drive is slowed down because the time for the heads to move between fragments on the disk surface can be substantial.
See: The Importance of Disk Defragmentation for detailed instructions.

In addition to running the Disk Defragmenter at regular intervals, monthly is optimal, there are other times you should run it too, such as when:
  • You add a large number of files.
  • Your free disk space totals 15 percent or less.
  • You install new programs or a new version of Windows
Microsofts built in Disk Defragment utility, does as good a job as any, but is known to be slow.

Here are free alternatives that do the same job in a much quicker time.For defragmenting your pagefile and registry hives use PageDefrag

Note: It is recommended to shut down all applications including your antivirus before running a disk defrag to avoid the process from continually starting over.
For the best results it should be run from safe mode

Defragment the Registry

As a speed tweak defragmenting the Registry is probably not ever going to show an improvement in performance. But over time it can become very large and should occasionally be defragmented.

You can compact and defrag the registry with Auslogics Registry Defrag

Vista and Internet Explorer 7
The Phishing Filter could be causing your computer to respond very slowly as it evaluates Web page contents.
See The Phishing Filter may slow down the PC and Phishing Filter FAQs

Detect and repair disk errors

CHKDSK is best to be ran in SAFE MODE.

  1. Click Start, and then click Computer.
  2. Right-click the volume you want to check, and then click Properties.
  3. Click the Tools tab, and then click Check Now.
  4. Do one of the following:
  • To run CHKDSK in read-only mode, clear all check boxes, and then click Start.
    • To repair errors without scanning the volume for bad sectors, select the Automatically Fix File System Errors check box, and then click Start.
      • To repair errors, locate bad sectors, and recover readable information, select both the
      • Automatically Fix File System Errors
      • and Scan For And Attempt Recovery Of Bad Sectors check boxes.
      • Then click Start.
Windows XP and 2000 - Click Start > Run > type CHKDSK and click OK.

Windows 98 or Me - Click Start > Programs > Accessories > System Tools > ScanDisk.

Check for damaged, altered or missing critical system files

The System File Checker (SFC) searches for protected files that have been damaged, altered or are missing. It restores the correct version of the file from the cache folder.
  • You must be logged on as an administrator or as a member of the Administrators group to run sfc.
  • You may be asked to insert your XP Installation CD so have it available.
Win 98 Using System File Checker
XP Using the System File Checker Tool
How to automatically repair Windows Vista using Startup Repair

Manage autostart items

A huge culprit of computers loading and running slow is what is running in the background

CCleaner also has a startup manager.
Open CCleaner click Tools then Startup
You can delete any unneeded items from there.
Be careful, there is no backup.
Because the startup loads drivers and some programs you may need, be careful removing items you are unsure of.

You can either look up the program on Google or ask in our Support Forums what an item is for.

For quick reference use these online databases.
Some things to look for.

You will still be able to use these programs, you just have to launch them manually.

QuickTime Task
Musicmatch Jukebox
TkBellExe - RealPlayer Update
ISUSScheduler or ISUSPM Startup - InstallShield Updater Service
DVDLauncher - CyberLink PowerDVD
Adobe Reader Speed Launcher
Google Updater

StartUp Tool is an easy to use start-up items editor, which allows you to identify, add, edit, remove or disable start-up items using an intuitive graphical user interface.

MalwareBytes StartUpLite is a lightweight program that can disable or remove all known unnecessary startup entries from your computer and thus quicken the startup procedure of your system.

Startup Delayer allows you to setup how many seconds after Windows has started, to load each program.

Note: MSconfig should not be used as a startup manager. It is meant to be used for trouble shooting only. For more information see: How to deal with startup processes - Do not use MSconfig

Disable unnecessary Services to free System Resources

Services are programs that run when the computer starts up and continue to run as they aid the operating system in functionality.
There are many services that load and are not needed which take up memory space and CPU time.
Disabling these services will free up system resources which will speed up your overall computer experience.
It is recommend that you sort through the list and read the descriptions to decide if you need that service depending on what you want to do with your computer.
  • Remember, you can always turn the service back on if you find that you need it in the future.
Below is the procedure to turn off a service.
  1. Click the Start button.
  2. Select Run from the bottom of the right column.
  3. Type services.msc in the box and click OK.
  4. Once the services window has loaded you are ready to turn off unneeded services.
  5. Find this service you wish to disable in the list and select it with the mouse.
  6. Right click and select Properties.
  7. Once the properties windows has loaded locate the Start up type drop down box and select Disable.
  8. Then click OK and the next time the computer starts the service will not be loaded.

Disable some visual effects

While visual enhancements may be attractive, they can slow a computer down. Disabling some of them will free up system resources and makes the operating system perform better.
  • Right click My Computer, choose > Properties > Advanced, click on Settings
  • In the Visual Effects tab, select Adjust for best performance or uncheck all the visual effects, except for the last three.
  • Click Apply, then OK, then OK again.
  • Then right click your Desktop and choose > Properties > Appearance > "Effects.
  • Uncheck the first two boxes and click OK.

Update! Update! Update!

Many people do not like automatic updates. If this is the case get in the habit of frequently checking the Microsoft website for critical security updates.

Go to and install ALL critical security updates.

Protect Your Computer - Microsoft Update - Microsoft Security

Secuna Software Inspector is an extremely useful tool which is strongly recommend to use at least once a month.

Clean the dust out

Always turn your computer off before you begin and unplug all power cords

Heat is the biggest cause of component failure in computers.
Dust clogs the vents behind your computer, which causes your CPU to overheat and cause faulty processor fans which can result in unexpected shutdowns, random restarts, booting problems, etc.

Regular cleaning could save you costly maintenance fees down the road.
  • Remove the cover touching as little as possible inside the computer and take a moist towel and wipe any dust from the interior of the cover.
  • Blow compressed air around all of the components and along the bottom of the case, keeping the nozzle four inches away from the machine.
  • Blow air into the power supply box and into the fan (from the back of the case).
  • Blow air into the floppy disk and CD drives.
Last, check that your connections are secure.

Cleaning the Interior of your PC
Curing Laptop Overheating

Create a Restore Point

When you are all done be sure to Create a new Restore Point to ensure you keep all the changes you just made

You must be logged on to an administrator account.
  • Go to Start
  • All Programs
  • Accessories
  • System Tools
  • System Restore
Choose the radio button marked Create a Restore Point on the first screen then click Next.

Give the new Restore Point a name, then click Create. The new Restore Point will be stamped with the current date and time.
  • You may want to keep a log of this so you can find it easily should you need to use System Restore.
Then use Disk Cleanup to remove all but newly created Restore Point.
  • Go to Start > Run and type: Cleanmgr
  • Click OK.
  • Click the More Options tab.
  • Click Clean Up in the System Restore section to remove all previous restore points except the newly created one.

More suggestions and performance tips

Restore Your Computer's Performance with Windows XP
XP Performance Tweaks
Performance Boost for XP
How to fix the top 10 Internet Explorer issues Rust Never Sleeps: How To Deal With Moisture And Corrosion In Your PC

Add more RAM

This is a quick solution that can have a dramatic affect on your system's speed and responsiveness.

You can check how much RAM you have.
Right click My Computer
Choose Properties > General tab.

If you have 512MB
Pay attention to what software you install.
Every computer needs Security software installed (Antivirus+Firewall) and they should start up with Windows and run in the background.
If you have 512MB or less choose an Antivirus and Firewall that doesn't require that much memory and processing time.
Don't install "heavy" Security Suites like Norton, Panda, McAfee, TrendMicro...

Understanding, Identifying and Upgrading the RAM in your PC

PC Pitstop
  • Is your PC acting sluggish?
  • Do you have to reboot your computer because of errors and lockups?
  • Stop by PC Pitstop for a free computer checkup and diagnostics that can help you detect and fix many common computer problems.

Wednesday, May 21, 2008

Defragment Your System Files (Pagefile and Registry) in Windows XP

Image Hosted by

In the pursuit for performance, making sure your drive isn't fragmented is a regular task. The problem is that Windows XP doesn't allow certain system files to be defragmented without commercial software. What about free solutions?

There's a utility called PageDefrag from Sysinternals (Microsoft) that lets you do one single task, and it does it well. It runs as a boot-time process that defragments the system files before they are locked by XP.

Defragment Your System Files

When you open up the application, you'll see a list of the system files and the number of fragments each file is in. Select the "Defragment at next boot" option, or you could even choose to defragment at every boot, although I wouldn't necessarily recommend that.

Image Hosted by

When you reboot, you'll be prompted by PageDefrag to hit a key if you don't want to defragment now.

Image Hosted by

If you didn't abort the defrag, you'll now see the defragment in process. As you can see, mine didn't need to be defragmented anyway…

Image Hosted by

If you selected the option to defragment on every boot but would like to remove it, you can open up the application and select "Don't defragment (uninstall)", and then click the OK button.

Image Hosted by

This should be an essential utility in any geek's toolkit. Note that this isn't a substitute for defragmenting your other files on a regular basis.

Download PageDefrag from Microsoft

Source: How-To Geek

Tuesday, May 20, 2008

Keeping Yourself Safe On The Web

Image Hosted by

Keep normal computer functionality while combating malware

Keep Windows Updated! - Internet Explorer

  • Always keep current with the latest Microsoft security updates by applying Service Packs and all critical updates issued on the second Tuesday of each month. Also known as Patch Tuesday.
    • These can patch many of the security holes through which attackers can infect your computer.
  • Do not turn off Automatic Updates!
  • Go to Start > Control Panel > Automatic Updates to ensure they are on.

Tighten Internet Explorer's Security Setting
  • Since Internet Explorer is the leading browser it will always be the lead in attacks from the bad guys.
    • Make your Internet Explorer more secure
      1. From within Internet Explorer click the Tools menu and then on Internet Options.
      2. Click once on the Security tab
      3. Click once on the Internet icon so it becomes highlighted.
      4. Click once on the Custom Level button.
        • Change the Download signed ActiveX controls to Prompt
        • Change the Download unsigned ActiveX controls to Disable
        • Change the Initialize and script ActiveX controls not marked as safe to Disable
        • Change the Installation of desktop items to Prompt
        • Change the Launching programs and files in an IFRAME to Prompt
        • Change the Navigate sub-frames across different domains to Prompt
        • When all these settings have been made, click on the OK button.
        • If it prompts you as to whether or not you want to save the settings, press the Yes button.
      5. Next press the Apply button and then the OK to exit the Internet Properties page.

Tighten Internet Explorer's Security Setting continued
- Default Internet Explorer settings should be set to high.
  1. Start up IE then go to Tools > Internet Options > Security
  2. Set the Security level for the Internet Zone to High. (If no slider is visible, click Default Level.)
  3. Click the Trusted Sites icon.
  4. Set the Security level for the this Zone to Medium. (If no slider is visible, click Default Level.)
  5. Click OK.

Use a Personal Firewall
- Using more than one at a time can cause system crashes and/or program conflicts.
  • It is critical that you use a firewall to protect your computer and your personal information from hackers.
  • Use a third party firewall

Use anti virus software
- Only use one antivirus to avoid system conflicts.
  • Always make sure your antivirus is up to date!
  • Set the updates to automatic. Or get in the habit of manually checking for updates weekly.
  • Below are some reliable free and paid antivirus.

Online Virus Scans - Occasionally run an online scan.
These all remove what they find for free

Anti-malware Programs
- Use more than one.
Some listed below also have paid versions that offer real time protection.
Only one antispyware with
real time protection is required but the use of multiple on-demand scanners is suggested.
Be sure to check for updates before each scan
  • Antispyware test:
    • Spycar - A suite of tools designed to simulate spyware-like behavior.

Realtime Malware Blockers
- Programs that are designed to preventing malware from being installed.
Both of these can be used along with one real time spyware protection.

Dialup Users -
Avoid Dialer rip offs.

- Real time Infiltration Detection.
System Restore and Backups
- Do a complete virus scan before performing any backups.
  • Backup refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.

Backup software
- Backups can be a invaluable resource.
  • ERUNT & NTREGOPT A useful freeware utility for users of Windows 2000/XP.
  • It's made up of two parts, ERUNT & NTREGOPT.
    • ERUNT will create daily complete backups of your computer's Registry. Whilst System Restore does the same thing, a corrupt registry file may prevent Windows from booting & this effectively disables System Restore. With ERUNT, you're able to restore the damaged Registry.
    • NTREGOPT works by recreating each registry hive "from scratch", thus removing any slack space that may be left from previously modified or deleted keys. In other words, it compacts the Registry to a small size which allows Windows to load & perform faster.
  • Karen's Port Replicator is a fantastic freeware backup program that's easy to use, and it allows scheduled backups.
  • Acronis True Image is a very attractive and reasonably priced hard drive imaging program, that can save you in the event your hard drive fails unexpectedly. Acronis supports Microsoft Windows Vista and offers a 15 day trial version.

Alternate Web Browsers
- More secure, and customizable.
  • Alternative browsers like Mozilla Firefox are somewhat more secure because they are have fewer security holes. This is because fewer malware writers target the non Microsoft browsers.
  • Opera is a full-featured Internet power tool with many useful tools and features.
  • Avant Browser is a fast, stable, user-friendly, versatile web browser with many features.
You must remember that no browser will offer complete protection. If you access questionable sites, download illegal, pirated or keygens/cracked software or visit porn type websites then no browser will be secure enough!

Software Updates
- An extremely useful tool which is strongly recommend to use at least once a month.
  • Secuna Software Inspector
    • Detects insecure versions of applications installed
    • Verifies that all Microsoft patches are applied
    • Assists you in updating your system and applications
    • Runs through your browser. No installation or download is required.
  • The Secunia Software Inspector covers
    • Internet browsers
    • Internet browser plugins
    • Instant messaging clients
    • Email clients
    • Media players
    • Operating systems

Sun Java JRE (Java Runtime Environment)
- It is very important not only to keep Sun Java up to date but also to remove older versions which have security holes and can be exploited by malware.
  • Uninstall any old versions of Sun Java in Add/Remove Programs.
  • Download the latest version from
  • The Microsoft Java Virtual Machine, or MS Java VM, should be removed due to it no longer being supported by Microsoft. It has become obsolete which leaves it open to exploit by malware.

CCleaner - Erase your tracks.
Download CCleaner

It is suggested to download the CCleaner - Slim - No Toolbar which is the version without the Yahoo! Toolbar.
  • Double click on the ccsetup.exe file to start the installation of the program.
  • Select your language and click OK, then next.
  • Read the license agreement and click I Agree.
  • Click next to use the default install location.
  • Under Install Options, choose all the default settings
  • Click Install then finish to complete installation.
  • Double click the CCleaner shortcut on the desktop to start the program.
  • On the Windows tab, under Internet Explorer, uncheck Cookies if you do not want them deleted. (If deleted, you will likely need to reenter your passwords at all sites where a cookie is used to recognize you when you visit).
  • If you use either the Firefox or Mozilla browsers, the box to uncheck for Cookies is on the Applications tab, under Firefox/Mozilla.
  • Click on the Options icon at the left side of the window, then click on Advanced.
    Only delete files in Windows Temp folders older than 48 hours.
  • Click on the Cleaner icon on the left side of the window, then click Run Cleaner to run the program.
  • Caution: It is recommended that you use the Registry feature with care.
  • Always back up the Registry before removing anything with the Registry cleaner.
  • Exit CCleaner.

Watch What You Download!
- Screen savers, codecs, audio/video files, chat and e-mail attachments are just a few threats.

Malware can be hidden in illicit software or other files and programs you might download from the Internet.

Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, include pop-up advertisements, steal your personal information or just plain crash your browser and even the Operating System itself.
  • P2P programs come with an enormous amount of bundled malware. There are also multiple sites that offer rouge antimalware products.
  • Javacools EULAlyzer can analyze End User License Agreements in seconds. Discover if the software you're about to install displays pop-up ads, transmits personally identifiable information, uses unique identifiers to track you, and much much more.

Malware Free All-In-1 Codec Packs
- The K-Lite Codec Pack should be all you ever need.

If there is a video or audio file that says it needs anything besides what the below codec packs include, it likely contains malware.

RougeRemover Free
- Be confident your programs are safe.
  1. Download Malwarebytes' RogueRemover Free
  2. Double click the icon to install RogueRemover and then start the program.
  3. Press Check for Updates.
  4. This will show you if there is a newer version of the database. Click Download.
  5. Go back to the main screen and click Scan.
  6. If and when an infection is found, remove ALL objects found.
  • Rouge Remover will check your PC for hundreds of rouge applications in seconds.

Website Analysis
- Always know the sites you download from or visiting are safe.
  • Dr. Web Link Scan - Scan a link or file before you download it by copy and then paste the download or url link into the white box then click Scan
  • LinkScanner - If you'd rather be safe than sorry, enter the URL of the site or web page you want to visit in the box next to URL to scan: then click Scan
  • LinkScanner Lite - Integrates with major search engines to check search results for a variety of online threats before you click.
  • McAfee Site Advisor - A nice addition to your Internet Explorer or Firefox web browser. It will not stop an attack but uses a simple three color system to indicate the safety level of a website.
    • According to the Site Advisor website 95% of websites have been tested.
To install Site Advisor, just download the Plug-in for Internet Explorer or the Plug-in for FireFox
  • Phishing is prevalent and on the rise. Make sure the site you go to is real. Your ISP or Web Browser may offer a toolbar to warn you of fake sites or you can choose one of the following
  • Spoofstick Toolbar
  • Netcraft Toolbar

Cookie Management
- Generally harmless, cookies are pieces of information generated by a Web server and stored on the user's computer.
  • Cookie Viewer - This Power Tool automatically scans your computer, looking for "cookies". It can then display the data stored in each one and can delete them.
  • Cookie Cruncher - Protects your hard drive from unwanted cookies.
  • Cookie Culler - Extended Cookie Manager. Protect/unprotect selected cookies. (Firefox only)
  • Add N Edit Cookies - Gives you the ability to easily alter, edit or delete cookies. (Firefox only)

Scan your security event log - Check for high security events happening on your machine.
GFI Event Log Scanner
  • Use EventLogScan to check that your system is truly secure!

Test your work
- Check if your PC is secure.
CA Pest Patrol
PC Flank test site
  • Free Optimization Scan
  • Free Privacy Scan
F-Secure Health Check
  • Checks whether you have an Anti-Virus, Firewall and Anti-Spyware software installed on your computer.
  • Checks whether you have known vulnerabilities in your applications.
  • Checks whether you have applications that are no longer supported by the vendor.
  • Helps you fix the vulnerabilities found.
Symantec Security Check
  • Check tests your computer's exposure to a wide range of online threats.
  • Is your computer safe from online threats?
  • Is your computer free of viruses?

- Videos & quizzes

Monday, May 19, 2008

May Patch Tuesday Release

May Patch Tuesday Release | TrendLabs | Malware Blog - by Trend Micro

May Patch Tuesday Release

May 15th, 2008 by JM Hipolito (Technical Communications)

May’s Patch Tuesday came earlier this week, addressing six vulnerabilities. The latest batch of Microsoft Security Bulletin consisted of four security updates, with three rated as critical and one as moderate.
This batch includes a security update on the vulnerability found in Microsoft Jet Database Engine that was initially reported late March.
Here is the set of security advisories for May:
Risk Rating: Critical
Risk Rating: Moderate
All users are strongly encouraged to download the mentioned patches from Microsoft immediately.

Friday, May 16, 2008

SysExporter: extract infromation from any program or window, even when copying and pasting is not an option

Description: SysExporter utility allows you to grab the data stored in standard list-views, tree-views, list boxes, combo boxes, text-boxes, and WebBrowser/HTML controls from almost any application running on your system, and export it to text, HTML or XML file.
Here's some examples for data that you can export with SysExporter:

  • The files list inside archive file (.zip, .rar, and so on) as displayed by WinZip or 7-Zip File Manager.
  • The files list inside a folder.
  • The event log of Windows.
  • The list of emails and contacts in Outlook Express.
  • The Registry values displayed in the right pane of the Registry Editor.
  • The data displayed by SysInternals utilities (Registry Monitor, File Monitor, Process Explorer, and others.)
  • The text inside a standard message-box of Windows.
  • The HTML inside any instance of Internet Explorer.

Image Hosted by
Information you can extract: everything, from a list of checkboxes used by a program or dialog to the list of files in a folder to the HTML of a web page.
The user interface: simple and straightforward. Scroll throught the different controls/elements in the top pane, and preview the available data in the bottom pane. Note that you could filter across the different controls (e.g. Listview, Listbox, Combobox, Treeview, etc), as the program allows you to activate/deactivate these at will. If you don’t quite know what this means forget about it: simply scroll through all the available dialogs of the program you seek and you will find your info.
Portable: installer setup as well as zip-only versions available.
Another fantastic freeware release from NirSoft.

Compatibility: WinAll - 64-bit version also available.
SysExporter Homepage
NirSoft Homepage

Tuesday, May 13, 2008

Free Acronis True Image 8 Personal

Image Hosted by ImageShack.usPC Pro Magazine and Acronis have teamed up to offer version 8 "free".

All you need to do is to Register at Acronis, have them send you a product password to complete your registration.

After completing the registration process, they'll send the product key to unlock Acronis True Image 8 Personal.

Once you have all of the information needed you will need to locate the installation file.

Once registered at the Acronis website, they will send you a confirmation email asking if you really want a serial number. Click on the link embedded in the email. Then Acronis will send you another email with the serial number. Then, you need to go back into the Acronis website. Click on the "My Account" and enter your registration name and password. Once you're logged in to "My Account", click on the "Registered Products" link.

Image Hosted by

It should open up and show Acronis True Image 8.0 registered that you can then download. Good luck!

Image Hosted by

Acronis Homepage
User Guide

Monday, May 12, 2008

How To Install Vista Style Drive Icons In Windows XP

Image Hosted by ImageShack.usWindows Vista comes with a nice feature, and that is the graph of drive space for your drive icons. With them you can easily see how much space it is used.

These new icons looks almost identical to the ones in Vista, but the most important change is the new bar under the icon that gives you a bar graph of the current drive space.

Download DrvIcon and install it on your Hard drive.

The new icons will look similar to these:

Image Hosted by

When your drive is running low on space the graph will turn red to indicate that you should probably stop putting information on it.

Image Hosted by

When you have enough free space on the drive the bar color will be light blue.

Image Hosted by

Download DrvIcon

Sunday, May 11, 2008

Trend Micro™ RUBotted (Beta)

Image Hosted by ImageShack.usMalicious software called Bots can secretly take control of computers and make them participate in networks called “Botnets.” These networks can harness massive computing power and Internet bandwidth to relay spam, attack web servers, infect more computers, and perform other illicit activities.

Trend Micro RUBotted is a BETA program that scans your system for bot related activity protecting it effectively from being hijacked and misused for criminal activity. The computer is monitored for activity that is either harmful for the computer it is running on or other computers that are affected by actions from the monitored computer.

The main protection is gained from monitoring possible remote commands and control commands that are send from another computer . Other likely bot-related activities like mass mailings are monitored as well. RUBotted can be installed on Windows XP, Windows 2000, Windows Vista and Windows Server.

The security application should work in conjunction with antivirus applications, even if those have not been designed by Trend Micro. In addition RUBotted offers to scan the computer using Trend Micro’s HouseCall, an online virus scanner. Some settings are offered to exclude specific requests from being monitored, those are: http incoming, smtp outgoing, irc requests and dns queries.

Source: gHacks
Trend Secure

Friday, May 9, 2008

Don't want Vista SP1? - Windows Service Pack Blocker Tool

Image Hosted by ImageShack.usSince Vista SP1 has been in Beta stages there have been many problems with the highly anticipated release. Unfortunately many users have reported big problems with the SP and many have vowed to wait until it has been thoroughly proven as stable until the take the plunge.

If you want to install it on your own schedule rather than letting the update hijack your PC, use the standalone installer.

Don't want SP1? Just use the Windows Service Pack Blocker Tool to keep Windows Update from installing it.

Windows Vista Service Pack 1 Information